Back to Home
graphlit icon

graphlit-mcp-server

by graphlit

Overview

The Model Context Protocol (MCP) Server integrates with the Graphlit platform to ingest diverse data sources, build a searchable knowledge base, and enable LLM-powered search, retrieval, RAG, and generative capabilities for MCP clients.

Installation

Run Command
npx -y graphlit-mcp-server

Environment Variables

  • GRAPHLIT_ENVIRONMENT_ID
  • GRAPHLIT_ORGANIZATION_ID
  • GRAPHLIT_JWT_SECRET
  • SLACK_BOT_TOKEN
  • DISCORD_BOT_TOKEN
  • TWITTER_TOKEN
  • TWITTER_CONSUMER_API_KEY
  • TWITTER_CONSUMER_API_SECRET
  • TWITTER_ACCESS_TOKEN_KEY
  • TWITTER_ACCESS_TOKEN_SECRET
  • GOOGLE_EMAIL_REFRESH_TOKEN
  • GOOGLE_EMAIL_CLIENT_ID
  • GOOGLE_EMAIL_CLIENT_SECRET
  • GOOGLE_DRIVE_SERVICE_ACCOUNT_JSON
  • GOOGLE_DRIVE_CLIENT_ID
  • GOOGLE_DRIVE_CLIENT_SECRET
  • GOOGLE_DRIVE_REFRESH_TOKEN
  • GOOGLE_CLIENT_ID
  • GOOGLE_CLIENT_SECRET
  • GOOGLE_REFRESH_TOKEN
  • MICROSOFT_EMAIL_CLIENT_ID
  • MICROSOFT_EMAIL_CLIENT_SECRET
  • MICROSOFT_EMAIL_REFRESH_TOKEN
  • MICROSOFT_TEAMS_CLIENT_ID
  • MICROSOFT_TEAMS_CLIENT_SECRET
  • MICROSOFT_TEAMS_REFRESH_TOKEN
  • MICROSOFT_CLIENT_ID
  • MICROSOFT_CLIENT_SECRET
  • MICROSOFT_REFRESH_TOKEN
  • LINEAR_API_KEY
  • GITHUB_PERSONAL_ACCESS_TOKEN
  • JIRA_EMAIL
  • JIRA_TOKEN
  • NOTION_API_KEY
  • DROPBOX_APP_KEY
  • DROPBOX_APP_SECRET
  • DROPBOX_REFRESH_TOKEN
  • BOX_CLIENT_ID
  • BOX_CLIENT_SECRET
  • BOX_REDIRECT_URI
  • BOX_REFRESH_TOKEN
  • SHAREPOINT_ACCOUNT_NAME
  • SHAREPOINT_CLIENT_ID
  • SHAREPOINT_CLIENT_SECRET
  • SHAREPOINT_REFRESH_TOKEN
  • ONEDRIVE_CLIENT_ID
  • ONEDRIVE_CLIENT_SECRET
  • ONEDRIVE_REFRESH_TOKEN
  • FROM_EMAIL_ADDRESS

Security Notes

The server includes several functionalities that, if exposed to untrusted user input, could lead to severe vulnerabilities: 1. **Server-Side Request Forgery (SSRF):** The `ingestUrl` and `retrieveImages` tools directly accept a `url` parameter and perform `fetch(url)` or delegate to `client.ingestUri(url)`. An attacker could exploit this to make the server request arbitrary internal or external resources, potentially scanning internal networks, accessing sensitive local services, or bypassing firewall rules. 2. **Local File Inclusion (LFI):** The `ingestFile` tool accepts a `filePath` parameter and uses `fs.readFileSync(filePath)`. If an attacker can control this `filePath`, they could read any file on the server's filesystem that the Node.js process has permissions to access (e.g., `/etc/passwd`, `.env` files, SSH keys). 3. **Extensive Environment Variable Reliance:** Full functionality requires numerous environment variables for various third-party integrations (e.g., Slack, GitHub, Google, Twitter, Notion). Improper configuration or exposure of these secrets significantly increases the attack surface for account compromise. While the server's internal logic doesn't appear to contain explicit `eval` or intentional malicious code, the aforementioned input-driven vulnerabilities make it risky to run without robust input validation and strict isolation, especially when processing untrusted data.

Similar Servers

Stats

Interest Score75
Security Score4
Cost ClassHigh
Avg Tokens1000
Stars368
Forks50
Last Update2026-01-12

Tags

GraphlitLLMRAGKnowledge BaseData IngestionAI AgentsWeb ScrapingAPI Wrapper